IPsec is designed to provide the security at the
Explanation: Network layer is used for transferring the data from transport layer to another layers.
In tunnel mode IPsec protects the
Explanation: It is nothing but adding control bits to the packets.
A ___________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
Explanation: VIRTUAL PACKET NETWORK.
Which component is included in IP security?
Explanation: AH, ESP, IKE.
WPA2 is used for security in
Explanation: WPA2 is best with Wi-Fi connection.
An attempt to make a computer resource unavailable to its intended users is called
Explanation: Denial of service attack.
Extensible authentication protocol is authentication framework frequently used in
Explanation:Most data transfer is with wireless networks.
Pretty good privacy (PGP) is used in
Explanation: PGP is at email security.
PGP encrypts data by using a block cipher called
Explanation: PGP encrypts data by using a block cipher called international data encryption algorithm.
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.